Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes
Maitri Patel1, Rajan Patel2

1Maitri Patel, Research Scholar, Faculty of Engineering & Technology Sakalchand Patel University, Visnagar, Gujarat, India.

2Rajan Patel, Associate Professor, Department of Computer Engineering, Gandhinagar Institute of Technology, Moti-Bhoyan, Gandhinagar. Gujarat, India.

Manuscript received on 13 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript Published on 26 July 2019 | PP: 1330-1337 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F12700486S419/19©BEIESP | DOI: 10.35940/ijitee.F1270.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: In computer based system, key for the problem of identification, authentication and secrecy can be found in the field of cryptography. Dependence on public key infrastructure and to receive certificates signed by Certificate Authority (CA) to authenticate oneself for exchange of encrypted messages is one of the most significant limitation for the widespread adoption of Public Key Cryptography (PKC) as this process is time engrossing and error prone. Identity based cryptography (IBC) aspires to reduce the certificate and key management overhead of PKC. IBC’s important primordial is Identity-based Encryption (IBE). IBE provided emergent for perception of Identity based signature (IBS) schemes. In this paper, overview of IBE and IBS schemes has been given. Also, a survey on various IBE and IBS schemes has been performed to review different problems related to them. Finally, feasibility and applicability of IBC in current and future environments has been discussed.

Keywords: Certification Authority, Identity Based Cryptography, Public Key Cryptography, Identity Based Encryption, Security, Identity Based Signature.
Scope of the Article: Advanced Computer Networking